منابع مشابه
Clone Wars
Code clones, the result of the ”copy&paste” programming technique, have negative impact on software quality and on the efficiency of the software maintenance process. Although copying may be the fastest way of creating a new feature, after a while it is really hard to detect and maintain the multiple instances of the same code snippets. Based on static source code analysis, clone detectors try ...
متن کاملIntercepting Tokens: The Empire Strikes Back in the Clone Wars
We discuss interception attacks on cryptographic protocols which rely on trustworthy hardware like one-time memory tokens (Goldwasser et al., Crypto 2008). In such attacks the adversary can mount man-in-the-middle attacks and access, or even substitute, transmitted tokens. We show that many of the existing token-based protocols are vulnerable against this kind of attack, which typically lies ou...
متن کاملClone wars: the evolution of therapeutic resistance in cancer
Cancer chemotherapy kills some tumour cells, leaving behind resistant clones with less competition for space and resources. These clones, groups of cells that share common ancestry, proliferate without restriction causing disease relapse. Tumours contain a host of cancer clones that are genetically and epigenetically different from one another [1]. These clones follow a Darwinian process of som...
متن کاملQuantum physics. In clone wars, quantum computers need not apply.
R. Nagel, University of Chicago; June B. Nasrallah, Cornell University; William D. Nix, Stanford University. Helen R. A. Quinn, Stanford Linear Accelerator Center; Michael Rosbash, HHMI and Brandeis University; A. Catharine Ross, Pennsylvania State University; Linda J. Saif, Ohio State University, Wooster; Paul L. Schechter, MIT; William H. Schlesinger, Duke University; Robert J. Silbey, MIT; B...
متن کاملHow to Make ASLR Win the Clone Wars: Runtime Re-Randomization
Existing techniques for memory randomization such as the widely explored Address Space Layout Randomization (ASLR) perform a single, per-process randomization that is applied before or at the process’ load-time. The efficacy of such upfront randomizations crucially relies on the assumption that an attacker has only one chance to guess the randomized address, and that this attack succeeds only w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Neurosurgery
سال: 2005
ISSN: 0148-396X,1524-4040
DOI: 10.1093/neurosurgery/57.1.n7